The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wide-spreading mobile malware has become a dreadful issue in the increasingly popular mobile networks. Most of the mobile malware relies on network interface to coordinate operations, steal users' private information, and launch attack activities. In this paper, we propose TextDroid, an effective and automated malware detection method combining natural language processing and machine learning...
In opportunistic mobile networks (OppNets), nodes should be in listening state to discover the neighbors for opportunistic message forwarding. While in OppNets, contacts between nodes are sparse, most of nodes' energy is consumed in idle listening state, which highlights the need for energy saving in contact probing. Duty cycle operation can be applied to address this problem. However, it may cause...
To realize the vision of Internet-of-Things (IoT), numerous IoT devices have been developed for improving daily lives, in which smart home devices are among the most popular ones. Smart locks rely on smartphones to ease the burden of physical key management and keep tracking the door opening/close status, the security of which have aroused great interests from the security community. As security is...
In response to the mobile data tsunami, the research community has studied WiFi offloading based efforts to provide an immediate solution to mitigate the load on both the cellular space and mobile core network. However, this has caused mobile network operators (MNO) to lose control and visibility on the user data since the traffic is usually directed towards the Internet bypassing the operator's core...
Network virtualization and SDN-based routing allow carriers to flexibly configure their networks in response to demand and unexpected network disruptions. However, cellular networks, by nature, pose some unique challenges because of user mobility and control/data plane partitioning, which calls for new architectures and provisioning paradigms. In this paper, we address the latter part by devising...
In mobile networks, users may lose coverage when entering a building due to the high signal attenuation at windows and walls. Under such conditions, services with minimum bit-rate requirements, such as video streaming, often show poor Quality-of-Experience (QoE). We will approach this problem in two steps. First, we present a Bayesian detector that combines measurements from two Smartphone sensors...
In recent years, the ever-growing number of mobile users and demands for mobile services exert great pressure on wireless content transmission. It is still a challenge to provide high-quality service in mobile scenario. To improve the quality of mobile service, proactive caching is proposed to push popular and requested service content to the nearest base stations or access points from mobile users...
In this paper, we study the energy-efficient resource allocation in software-defined mobile networks with mobile edge computing and caching. With the introduction of caching and computing functions in mobile networks, content sources need to be selected according to the distribution of contents in caches, the capability of computational resources and the status of networks. Moreover, the network needs...
5G operators will utilize mobile edge computing (MEC) to shorten transmitting latency and fulfill the requirements of increasing mobile applications for high bandwidth and ultra-low latency. A mobile online system (MOS) supports mobile online applications to trigger events in the mobile devices, refresh data, and maintain data consistency in the clouds. As users run mobile online applications, a MOS...
Coded caching and cooperative caching have been considered as two promising technologies in heterogeneous small cell networks. Although some works have been done for coded caching and cooperative caching in heterogeneous small cell networks, to the best of our knowledge, these two important issues have traditionally been addressed separately. However, it is necessary to jointly consider these two...
To deal with the severe challenge from explosively increasing mobile users' multimedia service requests in mobile networks, introducing cloud-based computing platform and content caching into radio access networks (RANs) has become an effective emerging technique. In this paper, we propose a collaborative hierarchical caching framework in cloud RANs (C-RANs), which minimizes the access delay of content...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the infrastructure, to the Vehicle-to-vehicle (V2V) network. Floating content (FC) represents a promising paradigm to share ephemeral content without direct support from infrastructure. It is based on constraining...
Building on the adoption of the Network Functions Virtualization (NFV) and Software Defined Networking (SDN) paradigms, 5G networks promise distinctive features including the capability to support multi-tenancy. Virtual Network Operators (VNOs) are expected to co-exist over the shared infrastructure, realizing their network functionality on top of virtualized resources. In this context, we observe...
We consider a general class of stochastic optimization problems, in which the state represents a certain level or amount which can be partly used and depleted, and subsequently filled by a random amount. This is motivated by energy harvesting applications, in which one manages the amount of energy in a battery, but is also related to inventory models and queuing models. We propose a simple policy...
In this paper, we study the problem of data gathering in ad-hoc sensor networks using a mobile entity called mule. The mule traverses the children of failed sensors, to prevent loss of data. Our objective is to define the optimal communication tree and the mule's placement such that the mule's overall traveling distance is minimized. We explore this problem in several network topologies including:...
This paper introduces a paradigm shift in the way localization performance in wireless networks is analyzed. Currently, localization performance in networks is commonly benchmarked using the Cramér-Rao lower bound (CRLB), given a fixed geometry of anchor nodes and a target. By contrast, we consider networks with random geometries for which the CRLB itself becomes a random variable, and we seek a tractable...
In this paper we propose and evaluate an auction-based resource allocation mechanism in a cloud-based radio access network (C-RAN), where the spectrum is managed by several mobile virtual network operators (MVNOs) and the physical resource is owned by the C-RAN operator. Technically, our approach consists of two coupled auctions in a hierarchical way: the lower-level auction between end users and...
We would like to welcome you to Valencia, to attend The 4th International Conference on Software Defined Systems (SDS 2017) in Valencia, Spain from May 8 to May 11, 2017. SDS 2017 is becoming one of most well-known international technical conferences in the area of Software Defined Systems. We are much honored to serve this year as the general chairs of this conference. We are also very proud of this...
We have presented the real time database management in mobile computing system and supported by mobile computing system. The process of the system including various mobile system those are wireless network, the database management, disconnection.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.